Options

BOVPN problem

Good evening,

we have enabled a site to site tunnel (branch office gateway), everything seems to work except for https proxy, as soon as I activate the policy even without DPI my firebox no longer reaches any site.

Help

Comments

  • Options

    What is in your From: and To: fields on the HTTPS proxy policy?

    What is the order number of this policy?

    Is this a standard BOVPN or one that uses BOVPN Virtual interfaces?

    Enable Logging on this policy so that you see Allow log entries in traffic monitor for traffic allowed by this policy.
    This may help understand the issue.

  • Options

    Hi Bruce,

    the HTTPS-proxy policy is in automatic order, from an alias (network ip) to any-external, the BOVPN is standard without virtual interface, logging and debugging on the policy are already activated

  • Options

    From what you have said, I see no reason for the results that you see.

    Can you access a site by IP addr? If so, then perhaps it is a DNS issue that is not obvious.

    You must have some other policy which allows HTTP & HTTPS. Is logging enabled on that one too? If so, do you see allowed HTTPS (TCP 443) from that policy when the new HTTPS proxy is enabled?

    If there is nothing in your logs to help understand this, you should open a support case on this.

  • Options

    Hi Bruce,

    even with IP you can't open the site, I also thought about the DNS problem, but instead I manage to ping and resolve the site.

    I think it's more a tunnel encapsulation problem, on the other hand we don't have a watchguard but a mikrotik routerboard.

    I've already opened a ticket about it, thanks for now

  • Options

    Is this a zero route BOVPN - where all traffic from the remote site goes via the main site firewall?

    If so, which end is the remote site?

  • Options

    yes, what do you mean know by remote site end?

  • Options

    From which end (Mikrotik or WG) does all traffic go to the other end, and then to the Internet?

    I'm trying to understand exactly what you have set up.
    Seems that I am missing some details...

  • Options

    Mikrotik ---> Watchguard

  • Options
    edited November 2023

    So, once the HTTPS proxy is added to Fireware, no traffic from the Mikrotik goes to the Internet, other than Ping/tracert?

  • Options

    that's right, ping and tracert are ok

  • Options

    More details about the alias (network IP) on the HTTPS proxy policy.
    Exactly what is the network IP, including subnet mask.
    Where is this network IP located? On the Microtek or the WG?

  • Options

    192.168.252.0/32, located in watchguard

  • Options

    192.168.252.0/32 is not normally a routable IP addr.
    Please explain this.

  • Options

    192.168.252.0/22

  • Options

    What subnet(s) are on the Microtek end in your BOVPN setup?

  • Options

    the same

  • Options
    edited November 2023
    The same subnet can’t be on both ends without using 1-to-1 NAT settings in the BOVPN Tunnel setting
  • Options
    edited November 2023

    Do note that much of the info that you have eventually supplied would have been helpful to know in your initial post.

    Make sure that support know this info as well.

  • Options

    Hi Bruce,

    to update, technical support solved the problem, basically they made us enable:

    1) on the extenal port, in the Advanced section, D'ont Fragment (DF) bit Setting for IPSCE from Copy to Clear

    2) inside Globa setting, Networking section, TCP MTU Probing from Disabled to Alway enabled

    Everything seems to have started now, now I'll do 6 more tests but it seems ok.

    Greetings

  • Options

    Thanks for the update

Sign In to comment.